- credential-theft
- password-spray
- legacy-protocols
- conditional-access
- entra-identity-protection
- mfa-gap
Credential Theft Campaign Targeting Legacy Protocols Blocked by Conditional Access
A persistent credential theft campaign targeting user_1@[INTERNAL_DOMAIN_1].com with 35 failed authentication attempts from 23 IP addresses across 15 countries was successfully blocked by conditional access policies, though the account remains at elevated risk due to absent MFA.
Time and cost estimates are based on a Tier-2 SOC analyst model and actual investigation telemetry. Individual results vary by analyst experience, tooling, and environment.
Initial Signal
Between February 22-25, 2026, Microsoft Entra Identity Protection flagged the account user_1@[INTERNAL_DOMAIN_1].com with 218 high-severity alerts. The signal: 35 failed sign-in attempts originating from 23 unique IP addresses spanning 15 countries—Morocco, Colombia, Finland, France, UK, US, Belgium, Sweden, Jamaica, Netherlands, India, Japan, Venezuela, Armenia, Mexico, and Luxembourg.
The attack pattern was methodical. Twenty-eight of the 35 attempts targeted legacy authentication via ROPC (Resource Owner Password Credentials) and Authenticated SMTP against Office 365 Exchange Online—protocols that bypass modern MFA controls. Microsoft Entra Identity Protection categorized the threats as 91 password spray alerts, 91 unfamiliar sign-in property detections, 29 anonymous IP flags, 18 atypical travel alerts, and 5 malicious IP identifications.
The investigation spanned 3m 46s of autonomous analysis across Microsoft Entra ID Sign-in Logs, Identity Protection risk detections, and authentication method configurations. Despite the account's critical vulnerability—no MFA registration, password-only authentication—conditional access policies with error code 53003 successfully blocked every unauthorized attempt. All legitimate activity originated from [SITE_1] corporate networks using managed devices.
How We Reached the Verdict
The agent considered each plausible alternative verdict and ruled them out one at a time. Each card below lists the hypothesis tested, the evidence weighed, and the dismissal rationale.
Could this be an account compromise?
Ruled out[SITE_1] corporate networks using managed devices[SITE_1] with proper device authentication. The sign-in logs show that conditional access policies successfully blocked authentication attempts even when passwords were correct, preventing actual account compromise.·High confidenceCould this be normal activity?
Ruled outCould this be a false positive?
Ruled outCould this be a policy violation?
Ruled outDisconfirming Evidence
Evidence that pushed against the agent's working hypothesis. Each item changed the direction of the investigation.
Evidence Gathered
The agent queried these data sources during the investigation. Each entry shows what was checked, what came back, and the methodology behind the query.
[INTERNAL_DOMAIN_1].com from 23 unique IP addresses across 15 countries between February 22-25, 2026[SITE_1], California IP addresses within the [EXTERNAL_IP_1]-[EXTERNAL_IP_4] range, identified as trusted named locations [NAMED_LOCATION_1] and [NAMED_LOCATION_2] networksFalse Positive Analysis
The agent ran these validation checks to confirm the verdict isn't a false positive.
- fp1Verified geographic distribution of authentication attempts across 15 countries including Morocco, Colombia, Finland, France, UK, US, Belgium, Sweden, Jamaica, Netherlands, India, Japan, Venezuela, Armenia, Mexico, and LuxembourgPass
- fp2Analyzed authentication protocols used in the attack attemptsPass
- fp3Evaluated Microsoft Entra Identity Protection risk assessmentsPass
- fp4Compared legitimate user activity patterns with suspicious authentication attemptsPass
Detection Opportunities
The high-fidelity detection signals from this investigation, sanitized for general use. Each MITRE ID links to the official technique reference.
| Technique | Tactic | Context |
|---|---|---|
T1078.004Valid Accounts - Cloud Accounts | Initial Access | Flag sign-in attempts from anonymous IP addresses, impossible travel patterns (authentication from geographically distant locations within minutes), and unfamiliar device properties targeting legacy authentication protocols. Alert on bulk authentication attempts (more than 5 in 1 hour) against a single account using ROPC or Authenticated SMTP, especially when originating from non-corporate IP ranges. Entra Identity Protection's unfamiliar sign-in property alerts should trigger immediate review of conditional access policy effectiveness. |
T1110.003Brute Force - Password Spraying | Credential Access | Monitor for multiple failed authentication attempts against a single account from diverse IP addresses within a short timeframe. Alert when more than 10 failed attempts occur within 24 hours, especially if they target legacy authentication methods like ROPC or Authenticated SMTP that bypass MFA. Correlate with Entra Identity Protection password spray alerts; 91 such alerts in 72 hours against one account is a strong indicator of an active campaign. |
T1078.004Valid Accounts - Cloud Accounts | Initial Access | Flag authentication attempts from geographically impossible locations—e.g., sign-in from Jamaica followed by sign-in from Japan within 30 minutes. Entra Identity Protection's atypical travel detection should be tuned to alert on any cross-continental authentication within 2 hours. Combine with IP reputation data to identify malicious IP addresses; in this case, 5 malicious IPs were detected among the 23 unique sources. |
T1578.004Modify Cloud Compute Infrastructure - Create Cloud Instance | Defense Evasion | Alert on sign-in attempts from IP addresses flagged as anonymous proxies, VPNs, or Tor exit nodes. In this investigation, 29 anonymous IP alerts were generated. Combine with other risk signals: if an anonymous IP is also flagged as malicious or shows atypical travel, escalate immediately. Block or require step-up authentication (e.g., MFA) for all sign-ins from anonymous IP ranges. |
T1190Exploit Public-Facing Application | Initial Access | Entra Identity Protection identified 5 malicious IP addresses among the 23 sources in this campaign. Implement IP reputation feeds and block or challenge all authentication from known malicious IPs. Correlate malicious IP alerts with other risk signals (password spray, anonymous IP, atypical travel) to confirm coordinated attack campaigns. In this case, the combination of malicious IPs + password spray + legacy protocol targeting = high-confidence credential attack. |
Verdict Reasoning
The verdict of Credential Compromise at high confidence rests on the following mutually corroborating signals:
1. Thirty-five failed authentication attempts from 23 geographically dispersed IP addresses across 15 countries within a 72-hour window, with 28 targeting legacy ROPC protocol via Exchange Online—a pattern consistent with credential stuffing or password spraying
2. Microsoft Entra Identity Protection's independent risk classification: 218 alerts including 91 password spray detections, 91 unfamiliar sign-in property alerts, 29 anonymous IP flags, and 5 malicious IP identifications, all marking the account as atRisk with high risk level
3. Conditional access policies successfully blocked all unauthorized attempts using error code 53003, preventing actual account compromise despite the attacker possessing or attempting valid credentials
4. Complete absence of successful sign-ins from suspicious locations or with anomalous patterns; all legitimate activity originated from [SITE_1] corporate networks using compliant managed devices
5. No post-authentication malicious activity detected—no data exfiltration, privilege escalation, or lateral movement—confirming the attack was contained before account takeover. Confidence is High rather than Confirmed because the account's lack of MFA registration and the absence of post-compromise telemetry leave a narrow gap: we cannot definitively rule out that the attacker obtained valid credentials, only that they failed to use them successfully before detection and blocking occurred
Lessons
- 01Legacy protocols are attack highways you cannot defend. This investigation shows 28 of 35 attack attempts (80%) targeted ROPC and Authenticated SMTP—legacy authentication methods that bypass MFA entirely. The attacker chose these protocols deliberately because they work around modern security controls. Conditional access policies blocked the attacks, but only because they were configured to do so. The lesson: disable legacy authentication protocols in your tenant unless there is an explicit business requirement. If you must support them, require step-up authentication and IP restrictions. In this case, disabling ROPC for Exchange Online would have stopped the attack at the protocol level.
- 02MFA absence is a critical vulnerability, not a minor gap. The user_1 account had zero MFA methods registered. The 218 alerts from Entra Identity Protection and the conditional access block were the only things standing between the attacker and account takeover. If conditional access had been misconfigured or if the attacker had used a trusted IP range, the account would have been compromised. Mandate MFA for all users, especially those with access to email or sensitive data. The cost of enrollment is negligible compared to the risk of a compromised account.
- 03Geographic dispersion across 15 countries in 72 hours is not a false positive. The investigation correctly ruled out false positive scenarios by noting the 15-country spread, the use of anonymization services, and the targeting of legacy protocols. However, this pattern is also a strong indicator that the attacker had access to a credential database or was running a large-scale password spray campaign. The presence of 5 malicious IPs among the 23 sources confirms this was not a single attacker but a coordinated campaign. Alert on any account seeing authentication from more than 5 countries in 24 hours; it is almost never legitimate business travel.
- 04Conditional access policies work, but only if you configure them correctly. Error code 53003 (Access has been blocked by Conditional Access policies) appeared repeatedly in the logs, meaning the policies were doing their job. However, the account remained at high risk because the attacker had the credentials and was actively trying to use them. Conditional access is a control, not a cure. After an attack like this, reset the user's password, enforce MFA enrollment, and review the policies to ensure they are blocking the right traffic. In this case, the policies should have also blocked ROPC entirely, not just required additional conditions.
- 05Legitimate activity patterns are your baseline for detecting the abnormal. All of user_1's legitimate sign-ins came from
[SITE_1]corporate networks using managed devices. This clear baseline made it trivial to spot the 35 failed attempts from 23 foreign IPs. Establish and document the normal authentication pattern for each user or role, then alert on deviations. In this investigation, the contrast between the legitimate[SITE_1]activity and the global attack attempts was stark. Use this principle to tune your detection rules: if a user never signs in from outside the US, flag any sign-in from Japan as suspicious.